scan2payme Security & Risk Analysis

wordpress.org/plugins/scan2payme

Plugin for displaying payment QR-Codes in WooCommerce order pages.

0 active installs v1.0.4 PHP 8.0+ WP 6.4+ Updated Unknown
bank-transfergirocodepaymentqr-codewoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is scan2payme Safe to Use in 2026?

Generally Safe

Score 100/100

scan2payme has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "scan2payme" plugin, in version 1.0.4, exhibits a mixed security posture. On the positive side, the plugin demonstrates excellent coding practices in several areas. All SQL queries are properly prepared, and all output is correctly escaped, indicating a strong defense against common injection and XSS vulnerabilities. There are no file operations or external HTTP requests, further reducing the attack surface. The absence of bundled libraries is also a good sign, as it avoids potential vulnerabilities from outdated dependencies.

However, a significant concern arises from the attack surface analysis. The plugin has a single entry point through an AJAX handler that completely lacks authentication checks. This presents a critical risk, as any unauthenticated user could potentially interact with this handler, leading to unintended actions or information disclosure. While taint analysis did not reveal any issues, the presence of an unprotected AJAX endpoint bypasses the need for taint to manifest a vulnerability, as the lack of authorization is the primary flaw.

Furthermore, the plugin's vulnerability history is entirely clean, with no recorded CVEs. While this is a positive indicator, it's important to note that a clean history does not guarantee future security. Coupled with the unprotected AJAX endpoint, this suggests that while the developers may have good intentions, there's a critical oversight in securing critical functionalities. The plugin's strengths in preventing common web vulnerabilities are overshadowed by the single, yet significant, vulnerability in its authentication mechanism.

Key Concerns

  • AJAX handler without authentication
Vulnerabilities
None known

scan2payme Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

scan2payme Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
42 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped42 total outputs
Attack Surface
1 unprotected

scan2payme Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_scan2payme_option_account_changedscan2payme-admin.php:50
WordPress Hooks 4
actionadmin_menuscan2payme-admin.php:17
actionadmin_enqueue_scriptsscan2payme-admin.php:22
actionadmin_initscan2payme-admin.php:390
actionplugins_loadedscan2payme.php:67
Maintenance & Trust

scan2payme Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedUnknown
PHP min version8.0
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

scan2payme Developer Profile

awaldherr

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect scan2payme

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/scan2payme/js/scan2payme-admin.js
Version Parameters
scan2payme/js/scan2payme-admin.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- TODO does the default value work if this is a fresh installation? -->
Data Attributes
data-nonce="scan2payme-account-nonce"
JS Globals
scan2payme_ajax_object
REST Endpoints
/wp-json/scan2payme/v1/options
FAQ

Frequently Asked Questions about scan2payme